15 research outputs found
Cluster Based Optimization of Routing in Distributed Sensor Networks Using Bayesian Networks with Tabu Search
This paper proposes a cluster based optimizat ion of routing in Distributed Sensor Network (DSN) by employing aBayesian network with Tabu search approach. Bayesian Network based approach is used to select efficient clusterheads, as well as construction of Bayesian Networks for the proposed scheme. This approach incorporates energylevel of each node, bandwidth and link efficiency. Simulations have been conducted to compare the performance ofthe proposed approach and LEACH.The optimization of routing is considered as a design issue in DSNs due to lack of energy consumption, delayand maximum time required for data transmission between source nodes (cluster heads) to sink node. In this work,optimization of routing takes place through cluster head nodes by using Tabu search. This meta - heuristic techniqueis used to optimize the routing in the DSN environment that guides a local search procedure to explore the solutionspace beyond local optimality. The objective of the proposed work is to improve the performance of network interms of energy consumption, throughput, packet delivery ratio, and time efficiency of optimizat ion of routing. Theresults shows that the proposed approach perform better than LEACH protocol and proposed protocol utilizesminimum energy and latency for cluster formation, thereby reducing the overhead of the protocol
Data Aware Routing in Wireless Sensor Networks
The wireless sensor network (WSN) has set of wireless intelligent sensor nodes with high speed network. Nodes are deployed randomly in a surge of unanticipated applications. The routing is one of the most important challenges in WSNs for data transmission over the sensor nodes. The paper proposes the data aware routing in WSNs, which incorporates energy efficient routing of data. The objective of the proposed work is to improve the performance of network in terms of energy consumption and throughput. The simulation results show that the proposed approach perform better in-terms of utilization of minimum energy, efficient for cluster formation, and reduce communication overhead in WSNs
Convolutional Neural Network Model Based Human Wearable Smart Ring System: Agent Approach
The Internet of Things has a set of smart objects with smart connectivity that assists in monitoring real world environment during emergency situations. It could monitor the various applications of emergency situations such as road accidents, criminal acts including physical assaults, kidnap cases, and other threats to people’s way of life. In this work, the proposed work is to afford real time services to users in emergency situations through Convolutional Neural Networks in terms of efficiency and reliable services. Finally, the proposed work has simulated with respect to the performance parameters of the proposed scheme like the probability of accuracy and processing time
A Comprehensive Survey on Resource Management in Internet of Things, Journal of Telecommunications and Information Technology, 2020, nr 4
Efficient resource management is a challenging task in distributed systems, such as the Internet of Things, fog, edge, and cloud computing. In this work, we present a broad overview of the Internet of Things ecosystem and of the challenges related to managing its resources. We also investigate the need for efficient resource management and the guidelines given/suggested by Standard Development Organizations. Additionally, this paper contains a comprehensive survey of the individual phases of resource management processes, focusing on resource modeling, resource discovery, resource estimation, and resource allocation approaches based on performance parameters or metrics, as well as on architecture types. This paper presents also the architecture of a generic resource management enabler. Furthermore, we present open issues concerning resource management, pointing out the directions of future research related to the Internet of Thing
Bayesian Network Based Fault Tolerance in Distributed Sensor Networks, Journal of Telecommunications and Information Technology, 2014, nr 4
A Distributed Sensor Network (DSN) consists of a set of sensors that are interconnected by a communication network. DSN is capable of acquiring and processing signals, communicating, and performing simple computational tasks. Such sensors can detect and collect data concerning any sign of node failure, earthquakes, floods and even a terrorist attack. Energy efficiency and fault-tolerance network control are the most important issues in the development of DSNs. In this work, two methods of fault tolerance are proposed: fault detection and recovery to achieve fault tolerance using Bayesian Networks (BNs). Bayesian Network is used to aid reasoning and decision making under uncertainty. The main objective of this work is to provide fault tolerance mechanism which is energy efficient and responsive to network using BNs. It is also used to detect energy depletion of node, link failure between nodes, and packet error in DSN. The proposed model is used to detect faults at node, sink and network level faults (link failure and packet error). The proposed fault recovery model is used to achieve fault tolerance by adjusting the network of the randomly deployed sensor nodes based on of its probabilities. Finally, the performance parameters for the proposed scheme are evaluated
A Survey on Data Perception in Cognitive Internet of Things, Journal of Telecommunications and Information Technology, 2019, nr 3
A Cognitive Internet of Things (CIoT) is a brand of Internet of Things (IoT) with cognitive and agreeable mechanisms, which are incorporated to advance performance and accomplish insights into real world environments. CIoT can perceive present system’s conditions, analyze the apparent information, make smart choices, and increase the network performance. In this survey paper, we present classifications of data perception techniques used in CIoT. This paper also compares the data perception works against energy consumption, network life-time, resource allocation, and throughput, as well as quality of data and delay. In addition, simulation tools for IoT and their performance are discussed. Finally, we provide the model of cognitive agent-based data perception in CIoT for future research and development, which ensures the network performance in terms of reliability, energy efficient, accuracy, scalable, fault tolerant, and quality of data
An Attribute-Based Encryption Method Using Outsourced Decryption and Hierarchical Access Structure, Journal of Telecommunications and Information Technology, 2022, nr 2
Cloud computing is being rapidly adopted by many organizations from different domains and large amounts of data is stored in the cloud. In order to ensure data security, the attribute-based access control mechanism has been emerging recently as a fine-grained access control model that grants access based on the data user’s attributes. In this model, the data owner builds the access policy using the attributes of the data users and access to the data is granted only if the requirements of such an access policy are satisfied. Ciphertext policy-based attribute-based encryption (CPABE) is one of the most widely used methods for providing encrypted access control. Complex, time consuming and costly paring operations are the major issue with the CPABE method. Hence, another efficient method is needed to reduce the data user’s overhead while decrypting data. This paper presents an efficient method consisting in outsourcing decryption operations to a third-party server, so that complex operations may be performed by that machine with only some simple calculations left on the data user’s side. The concept of a hierarchical access structure is also integrated with the traditional CPABE technique. The hierarchical approach enables the data owner to encrypt multiple data using a single common hierarchical access structure. This allows the user to decrypt only the relevant part of ciphertext, depending on which fragment of the hierarchical access structure is satisfied. The paper evaluates also the performance of the proposed model in terms of time and storage cost
Routing Misbehavior Detection in MANETs Using 2ACK, Journal of Telecommunications and Information Technology, 2010, nr 4
This paper proposes routing misbehavior detection in MANETs using 2ACK scheme. Routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. However, due to the open structure and scarcely available battery-based energy, node misbehavior may exist. In the existing system, there is a possibility that when a sender chooses an intermediate link to send some message to a destination, the intermediate link may pose problems such as, the intermediate node may not forward the packets to destination, it may take very long time to send packets or it may modify the contents of the packet. In MANETs, as there is no retransmission of packets once it is sent, care must be taken not to loose packets. We have analyzed and evaluated a technique, termed 2ACK scheme to detect and mitigate the effect of such routing misbehavior in MANETs environment. It is based on a simple 2-hop acknowledgment packet that is sent back by the receiver of the next-hop link. 2ACK transmission takes place for only a fraction of data packets, but not for all. Such a selective acknowledgment is intended to reduce the additional routing overhead caused by the 2ACK scheme. Our contribution in this paper is that, we have embedded some security aspects with 2ACK to check confidentiality of the message by verifying the original hash code with the hash code generated at the destination. If 2ACK is not received within the wait time or the hash code of the message is changed then the node to next hop link of sender is declared as the misbehaving link. We simulated the routing misbehavior detection using 2ACK scheme to test the operation scheme in terms of performance parameters
A Comprehensive Survey on Resource Management in Internet of Things
Efficient resource management is a challenging task in distributed systems, such as the Internet of Things, fog, edge, and cloud computing. In this work, we present a broad overview of the Internet of Things ecosystem and of the challenges related to managing its resources. We also investigate the need for efficient resource management and the guidelines given/suggested by Standard Development Organizations. Additionally, this paper contains a comprehensive survey of the individual phases of resource management processes, focusing on resource modeling, resource discovery, resource estimation, and resource allocation approaches based on performance parameters or metrics, as well as on architecture types. This paper presents also the architecture of a generic resource management enabler. Furthermore, we present open issues concerning resource management, pointing out the directions of future research related to the Internet of Things
Hybrid Centralized Peer to Peer Architecture for Resource Discovery and Secure Communication in Internet of Things
The Internet of Things (IoT) made communication between people and objects easy. It helps to build smart cities, homes, manufacturing systems, health monitoring systems, etc., for mankind. The increased adoption of IoT applications enabled many smart devices on the Internet platform. These devices deployed across the globe may have varying computational and communication capabilities. It is a great challenge to manage IoT resources efficiently. Some of well-known protocols are defined to identify and access IoT resources locally in a real-world environment. Many authors have adopted the Distributed Hash Table (D.H.T.) based Peer to Peer (P2P) model for global and massive resource management. However, D.H.T. based solutions have many shortcomings and are not perfectly suitable for the IoT domain. In this paper, it has been proposed a novel Hybrid Centralized Peer to Peer (HCP2P) architecture for efficient resource discovery and access mechanism. The proposed solution builds a secure communication channel among trusted peer devices with the aid of an HCP2P server. The trusted devices can discover and access the required resource efficiently and securely with reduced load on the central server. The proposed HCP2P solutions are evaluated on both hardware prototypes and simulations. The proposed model gives almost constant resource registration, discovery, and access time. This evaluation showed that HCP2P architecture performance is superior to traditional DHT-based P2P architecture. Finally, the performance parameters of the proposed scheme are evaluated in terms of resource registration time, discovery time, and hop-count